EP0176538A1 - Security system - Google Patents
Security systemInfo
- Publication number
- EP0176538A1 EP0176538A1 EP85901505A EP85901505A EP0176538A1 EP 0176538 A1 EP0176538 A1 EP 0176538A1 EP 85901505 A EP85901505 A EP 85901505A EP 85901505 A EP85901505 A EP 85901505A EP 0176538 A1 EP0176538 A1 EP 0176538A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- data
- encoded
- image
- optical element
- optical
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 230000003287 optical effect Effects 0.000 claims abstract description 57
- 230000017105 transposition Effects 0.000 claims description 6
- 230000001131 transforming effect Effects 0.000 claims description 4
- 238000004519 manufacturing process Methods 0.000 abstract description 6
- 238000004590 computer program Methods 0.000 abstract description 2
- 230000002401 inhibitory effect Effects 0.000 abstract 1
- 238000000034 method Methods 0.000 description 8
- 239000000463 material Substances 0.000 description 7
- 239000011159 matrix material Substances 0.000 description 7
- 238000010276 construction Methods 0.000 description 3
- 239000004973 liquid crystal related substance Substances 0.000 description 3
- 238000003860 storage Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 239000000835 fiber Substances 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 238000012856 packing Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000002730 additional effect Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000001093 holography Methods 0.000 description 1
- 230000005764 inhibitory process Effects 0.000 description 1
- 239000000976 ink Substances 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 238000002372 labelling Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000000465 moulding Methods 0.000 description 1
- 239000004033 plastic Substances 0.000 description 1
- 229920003023 plastic Polymers 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C5/00—Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
Definitions
- This invention relates to a security system and, in one particular embodiment. to security systems for protection of computer software against unauthorised access.
- One specific application for this invention is to inhibit the running of computer programs whilst still permitting the software to be copied.
- a further specific application of the invention is in the production of encoded documents, labels and tags which cannot be read but again, can be copied
- United States Patent 4480179 provides an apparatus for coding and/or decoding a written document comprising a plurality of fibre-optic light paths which re-arrange the relative positions of parts of the document while the document is being photocopied.
- the apparatus thus produces an encoded document which can be read by reversing the coding process.
- a system to inhibit unauthorised access to data comprising;
- a) output means to transpose two or more components of an element of said data in accordance with a preselected algorithm, and thus produce an encoded element
- the output means comprise at least one microprocessor programmed with said algorithm and means for displaying the encoded element in visible form
- the decoding means comprise at least one optical element capable of rearranging said encoded element.
- microprocessor By employing a microprocessor to encode the element of data in accordance with a preselected algorithm and employing an optical element capable of rearranging the encoded element when displayed in visible form, it is possible to enable an authorised user to access the element of data by providing the user with an optical element.
- optical element will depend on the particular form of the preselected algorithm.
- microprocessor is intended to include those elements of a computer which perform the functions of a microprocessor, such as, for example, the central processing unit.
- the element of said data comprises an alphanumeric character.
- the element of said data is selected at random from a range of elements and comprises the password for access to the data.
- the system further comprises input means for input of alphanumeric characters and comparator means for comparing the input with the element of said data selected at random from the data .
- the algorithm which encodes the data will be itself held as part of the data, as would a suitable password-generating program, and a suitable comparator program.
- the data would further comprise a set of machine readable instructions for the deletion or corruption of the data, or for the generation of a warning message for display either to the user or at some other location.
- the display means would comprise the VDU screen in embodiments which employ a computer unit as part of the system, however it should be noted that the invention is not to be considered as limited to such embodiments and extends to other embodiments employing light-emitting diodes, liquid crystal displays, or other visual signal generating means.
- the invention is not limited to embodiments in which the data is held in or on a magnetic form, such as on a reel of magnetic tape or a floppy or fixed disk. Therefore the invention is intended to extend to those embodiments in which data is encoded in other machine-readable forms, such as laser disks, punched tape or semiconductor arrays. Moreover some of the data may be recorded in other forms, such as photographic film materials or video tape or disk, and thus the invention extends to a system for the prevention of unauthorised access to, for example, a cable television or other diffusive system, including but not limited to systems in which at least part of the data is transmitted down fibre optic, telephone, or radio links or the like.
- the display may be static or may scroll in a direction such that the optical element is caused to scan the encoded element. If an image is formed of the encoded element this image may in some embodiments be a real image while in others may be a virtual image.
- the means for displaying the encoded element in visible form comprise a printing apparatus.
- the means for displaying the encoded element of data provide labels having the encoded element of data printed thereon.
- the manner of labelling shall not exclude the use of magnetic inks or other machine-readable printed formats.
- the computer software required to run the label printing embodiment of the invention will differ from that in the access inhibition system described generally above. It will however still include means for transposing portions of the element of data before display, although there is not in this embodiment a requirement that the element of data so encoded is selected at random, rather the element to be encoded will be selected specifically for coding under user or system control.
- an optical element capable of transforming a first image into a second image by the transposition of at least two portions of said first image
- the said optical element is substantially planar and at least one optical parameter of the said optical element varies across the said plane.
- the optical element comprises an array of light-transmissive elements each capable of deflecting a ray of light from a first path to a second path whereby at least two of said elements are so disposed to transpose the two portions of the first image.
- optical element may bring about the transposition of the elements of the encoded data by means of refraction at a surface or within a body of light-transmissive material having a varying refractive index.
- the surface of each light-transmissive element may be flat or curved, discontinuous or continuous, and that the optics of each light-transmissive element may be axisymmetric or non-axisymmetric. magnifying or non-magnifying, polarising or non-polarising.
- the optical element may comprise an array of light-reflective elements each capable of deflecting a ray of light from a first path to a second path whereby at least two of said elements are so disposed to transpose the two portions of the first image.
- optical element may be constructed within the definition given above. Again, it is envisaged that the surface of each element may be flat or curved, continuous or discontinuous.
- the invention should extend to those optical elements which employ the techniques of holography.
- a holograph as the optical element it is possible to make duplication of the element more difficult, without access to specialist equipment and therefore inhibit further unauthorised access to the data.
- the use of a holograph allows the precise optical configuration of the optical element to be varied during manufacture, as well as enabling easy mass production of the optical elements by a suitable photographic process.
- each said light-transmissive element comprises a prism.
- each said light-transmissive element By employing a prism as each said light-transmissive element it is possible to manufacture the optical elements cheaply and quickly from a suitable plastics material, for example by stamping, pressing and/or moulding operations.
- an optical element for use with the system according to the first aspect of the pres ent invent ion and capable of transf orming a f ir s t image into a second image by the transposition of at least two portions of said first image,
- the said optical element is a substantially planar, light-transmissive body having at least one optical parameter which varies across the said plane.
- Apparatus in accordance with the invention can be used for the protection of magnetically and optically recorded media, such as computer software or video recordings. As described above, it can also be used for decrypting printed material.
- the system can also be used in an electro-optical system internal to a machine or robot viewing device, i.e. without human vision.
- the light source for the device is obtained from a luminous screen or an array of light emitting devices, or in the case of printed material, natural or artificial light. Natural or artificial light would be used for liquid crystals or other non-light emitting devices.
- Figure 1 shows decoding of a displayed symbol.
- Figure 2 another method of decoding a differently encoded displayed symbol.
- Figure 3 a decoding device including means for magnification.
- Figure 4 illustrates a means of modifying the decoding device of Figure 4 in order to facilitate alignment.
- Figure 5 shows a further means of modification to prevent cross-talk.
- Figure 6 shows a mounting for the device of Figure 4.
- Figure 7 shows a diagram illustrating a method of setting up a device in accordance with the invention.
- Figure 8 shows a mounting means for a decoder device
- Figure 9 shows a means of incorporating a decoder device into a cassette tape holder.
- FIG. 10 is a block diagram of a data security system incorporating a device as described herein and,
- Figure 11 illustrates one possible flow chart for a microprocessor system which embodies the present invention.
- an encoded alphanumeric character is displayed in dot-matrix form on a screen (1).
- the dots making up the character to be read are deviated from their correct positions by distances and in directions determined by a predetermined algorithm so that the particular character cannot be recognised.
- Mounted before the display screen is a multi-faceted prism device (3) having facets (4) to rearrange the dot pattern to provide a decoded display or image of the display on screen (1).
- the dot pattern may include bogus dots which are either deflected to an insignificant position or are not transmitted by the prism.
- the mathematical mapping between the display on the screen and the image of the screen may be a one-one, many-one, many-many or one-many mapping.
- Figure 1 vertical co lumns of dots forming the character have been deviated s ideways by various distances to alter their order .
- the decoding pr ism ( 3 ) the angles of the prisms (4) have been calculated to deflect the vertical columns to their correct order.
- an eye (5) sees the dot matrix rearranged to display the decoded character (6), which in this example is the English alphabetic character "R" .
- the device is primarily intended to protect magnetically and opticaly stored data and under these conditions the algorithm for encrypting a character may be stored with the data on a suitable media.
- figure 2 shows a system in which the dots (7) of a dot-matrix character have been deviated in vertical and horizontal directions.
- the decoding optical element has the angles of the facets (9) calculated to correct the vertical and horizontal deviations.
- the resultant display (10) as seen by the user when the eye is positioned behind the device has been corrected by the optical system.
- optical elements there may be any number of optical elements in the optical path betwen the display and the viewer.
- optical techniques separately or in combination which may be used for encrypting data are faceted optical surfaces, axisymmetri ⁇ optical systems, non-axisymmetric optical systems, refracting elements, lenses, prisms, graded index optical media and materials of differing ref ractive indices .
- Addi tional ly the fo llowing may be employed either in combination with other techniques or in isolation; mirrors, pin holes, tubes and baffles, masks, polarisers, optical components with continuous (smooth) shapes, optical components with discontinuous shapes, fibre optics and waveguides, diffraction gratings and interference gratings or masks, holographic lens elements, and retroreflecting devices .
- Figure 3 shows a decoding device which contains a single compound magnifying element (11).
- An alternative is to add a magnifying element to each of the lenses within the construction. forming a lens array. These magnifying elements serve to aid vision, or to project the pattern onto a photoelectric detector.
- Spacing arms (13) may be added to the construction (14). Any suitable shape of spacing arms may be used to obtain the correct viewing distance or spacing of the decoder device from the display screen.
- the alignment points (19) may be identified by shape, flashing, intensity or colour.
- the physical position of the device is correct when the specific parts of the pattern overlap at the viewing position (22).
- Figure 8 shows how a decoder device (23) can be mounted on or built into a convenient size holder (24) to assist with the handling.
- the holder may have printing if required to identify the lens system and may include any of the features detailed in the previous Figures.
- Figure 9 shows how the features illustrated in Figures 4 and 8 can be combined so as to mount the optical system into the container or packing or recorded printed media.
- the optical system (22) is built into the lid of a cassette tape holder (26).
- the length of the lid (27) provides the correct viewing distance.
- the optical system may be incorporated into any convenient part of a container or packing material or with a suitable fitting attached to any piece of equipment.
- multi-faceted prisms may be used, with a plurality of facets to deflect dots in a predetermined position. This would have the advantage that the individual areas viewed are smaller than the dots of the matrix so facillitating alignment.
- a liquid crystal mask may be used as a decoder device, such as is described in Kowel et al. (Applied Optics, 23. 16. pp. 2774-2777). This has the two advantages that it makes the device more difficult to copy fraudulently and that its optical parameters may be changed under program control.
- FIG. 10 A complete system is depicted in Figure 10, in which an encrypted character is displayed on a display device (28).
- the display is decoded by a decoder (29).
- a trigger device (30) In response to the displayed character, a trigger device (30) generates a signal which is fed to a selector device (31) which permits or prevents access to further data according to the signal generated by the trigger device.
- FIG 11 shows one possible flow chart for the operation of a computer system which embodies the present invention. It should be understood that the manner in which computer systems display information is particularly variable from machine-type to machine-type and therefore the particular details of the program to perform this function will vary considerably over a range of machines; thus a general sceme is given by way of example.
- FIG 11a there is shown a general sceme for the flow chart of a program to be used as described herein.
- the processor unit starts by loading a randomly or pseudo-randomly selected character into RC1, and follows this by loading a second random or pseudorandom character into RC2.
- the processor then calls Subroutine A which displays the characters.
- the next routine excecuted is Subroutine B which reads the keyboard. as with the display of characters the particular manner in which a machine reads the keyboard will vary. Subroutines A and B are described in more detail below.
- the character read from the keyboard is now loaded into the register KC1 and a second keyboard reading operation is performed.
- the second character is also loaded into a register, this time KC2.
- the system denies access to the protected data and may in some embodiments delete or corrupt the data.
- Figure 11b gives a subroutine for the display of characters RC1 and RC2 in encoded form.
- the system first clears the screen and then displays a set of lens alignment points.
- Subroutine C is then called, which displays RC1 or RC2 in an encoded form.
- the subroutine ends at this point with a return instruction. It is important to note that the algorithm of subroutine C for encoding may be loaded into the microprocessor from the data itself.
- Figure 11c shows a schematic of subroutine B, that is the subroutine which reads the keyboard.
- the subroutine starts by setting a time period counter which holds a number indicative of the time since the subroutine was called.
- the keyboard is then read; this is normally done by scanning the keyboard or reading the keyboard buffer. If there is no input then the time period counter is reduced and a check is made to see whether or not the time period counter has reached zero. If the time period has expired then the subroutine is exited with a return instruction. If the time period has not expired then the keyboard is scanned again.
- the scanning loop is exited and a check is made as to whether or not the keyboard signal indicates that the user wishes to increase or decrease the size of the display. If a size change is reqired then subroutine A is called to erect a new display with the size factor E changed.
- the purpose of the size changing facility is to enable the system to be used with varying sizes of monitor screens. If no size change is required then the input character is stored and the subroutine exited.
- Figure lid shows subroutine C, which displays the encoded character.
- the subroutine contains two nested loops the outer one of which repeats for each byte and the inner one of which repeats for each bit.
- the display co-ordinates which are calculated are those which the algorithm states the first bit is to be transposed to, and so on for each bit.
- the algorithm may be stored as a table of required deviation or alternatively as a matrix of suitable dimensions to transform the coordinates of the character selected for coding. In the former the algorithm is changed by altering the contents of the table.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Record Information Processing For Printing (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Controls And Circuits For Display Device (AREA)
Abstract
Système de sécurité, en particulier pour la protection de logiciels d'ordinateurs contre un accès non autorisé. Une application spécifique de la présente invention vise à inhiber l'exécution de programmes d'ordinateur tout en permettant la copie des logiciels. Une autre application spécifique de l'invention est la production de documents, labels et étiquettes codés qui ne peuvent être lus mais peuvent être copiés. L'invention comprend un système permettant d'inhiber un accès non autorisé aux données, comprenant: a) des organes de sortie (28) permettant de transposer deux ou plusieurs composants d'un élément desdites données selon un algorithme présélectionné, et de produire ainsi un élément codé; b) des organes décodeurs (29-31) servant à réorganiser l'élément codé, de manière à recréer l'élément des données. L'invention se caractérise par le fait que les organes de sortie (28) comprennent au moins un microprocesseur programmé avec ledit algorithme et un organe d'affichage sous une forme visible de l'élément codé, et que les organes de décodage comprennent au moins un élément optique (29) pouvant réorganiser l'élément codé.Security system, in particular for protecting computer software against unauthorized access. A specific application of the present invention aims to inhibit the execution of computer programs while allowing the copying of software. Another specific application of the invention is the production of coded documents, labels and labels which cannot be read but can be copied. The invention comprises a system for inhibiting unauthorized access to data, comprising: a) output devices (28) for transposing two or more components of an item of said data according to a preselected algorithm, and thereby producing an encoded item; b) decoders (29-31) for reorganizing the coded element, so as to recreate the data element. The invention is characterized in that the output devices (28) comprise at least one microprocessor programmed with said algorithm and a display device in a visible form of the coded element, and that the decoding devices comprise at least an optical element (29) capable of rearranging the coded element.
Description
Claims
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB8408603 | 1984-04-04 | ||
GB8408603 | 1984-04-04 | ||
GB848425017A GB8425017D0 (en) | 1984-10-03 | 1984-10-03 | Security systems |
GB8425017 | 1984-10-03 |
Publications (1)
Publication Number | Publication Date |
---|---|
EP0176538A1 true EP0176538A1 (en) | 1986-04-09 |
Family
ID=26287554
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP85901505A Withdrawn EP0176538A1 (en) | 1984-04-04 | 1985-04-01 | Security system |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP0176538A1 (en) |
AU (1) | AU4154285A (en) |
CA (1) | CA1232080A (en) |
ES (1) | ES8802093A1 (en) |
IL (1) | IL74782A0 (en) |
WO (1) | WO1985004746A1 (en) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CH555577A (en) * | 1972-06-09 | 1974-10-31 | Gretag Ag | METHOD AND DEVICE FOR CONVERTING CLEAR GRAPHICAL INFORMATION INTO ENCRYPTED GRAPHICAL INFORMATION AND REVERSE |
US3814904A (en) * | 1972-10-20 | 1974-06-04 | Rca Corp | Cryptographically coded cards employing synthetic light modifying portion |
US3937565A (en) * | 1974-06-03 | 1976-02-10 | Alasia Alfred Victor | Process of coding indicia and product produced thereby |
GB2101376B (en) * | 1981-07-11 | 1986-05-21 | John Gordon Lawrence | Method and apparatus for use against counterfeiting |
-
1985
- 1985-04-01 EP EP85901505A patent/EP0176538A1/en not_active Withdrawn
- 1985-04-01 WO PCT/GB1985/000130 patent/WO1985004746A1/en not_active Application Discontinuation
- 1985-04-01 AU AU41542/85A patent/AU4154285A/en not_active Abandoned
- 1985-04-02 IL IL74782A patent/IL74782A0/en unknown
- 1985-04-03 ES ES541987A patent/ES8802093A1/en not_active Expired
- 1985-04-04 CA CA000478592A patent/CA1232080A/en not_active Expired
Non-Patent Citations (1)
Title |
---|
See references of WO8504746A1 * |
Also Published As
Publication number | Publication date |
---|---|
IL74782A0 (en) | 1985-07-31 |
ES8802093A1 (en) | 1987-01-16 |
ES541987A0 (en) | 1987-01-16 |
CA1232080A (en) | 1988-01-26 |
WO1985004746A1 (en) | 1985-10-24 |
AU4154285A (en) | 1985-11-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5032003A (en) | Optially variable surface pattern | |
US6070160A (en) | Non-linear database set searching apparatus and method | |
EP0611470B1 (en) | Optical image encryption and decryption processes | |
US8127251B2 (en) | Method and apparatus for a user interface with priority data | |
EP3075364B1 (en) | Trading card and trading card set | |
Neisser | The processes of vision | |
KR20010020146A (en) | System and method for identifying and authenticating accessories, auxiliary agents and/or fuels for technical apparatus | |
CN108885301A (en) | Pupil is balanced | |
EP1626407A2 (en) | Diffractive security device on compact discs | |
WO2008061652A2 (en) | Coding method, decoding method, codec and data storage medium for holographic storage | |
CA2153497A1 (en) | Apparatus and method for storing data | |
CN106605220A (en) | Method and system for selective document redaction | |
US5570207A (en) | Holographic image identification system | |
EP0371787A2 (en) | Decryption device | |
US20120262768A1 (en) | Stacking a visible image and a synthetic hologram | |
CN102890787A (en) | Constituting method of novel two-dimensional bar code | |
US5499116A (en) | Encoded hologram for producing a machine readable image and a human readable image | |
CA1232080A (en) | Security system | |
JP2010072382A (en) | Diffraction grating recording medium | |
US10001890B2 (en) | Touch tag recognizable through capacitive touch panel, information recognition method thereof and information providing method using same | |
US7126729B2 (en) | Double hologram | |
JPH0651124A (en) | Diffraction grating pattern consisting of volume phase type holographic grating and article having the same | |
JPS61501878A (en) | security device | |
EP0185724A1 (en) | An encoder/decoder | |
JP4249494B2 (en) | Medium using information generation pattern by optical diffraction structure |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH DE FR GB IT LI LU NL SE |
|
17P | Request for examination filed |
Effective date: 19860424 |
|
17Q | First examination report despatched |
Effective date: 19871202 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 19880413 |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: BINGHAM, RICHARD, GEORGE |